Desain dan Analisis Sistem CyberShare Menggunakan Four Node Interplanetary File System (IPFS)
Abstract
Keywords
References
A. Lamssaggad, N. Benamar, A. S. Hafid, and M. Msahli, “A Survey on the Current Security Landscape of Intelligent Transportation Systems,” IEEE Access, vol. 9, no. Vlc, pp. 9180–9208, 2021, doi: 10.1109/ACCESS.2021.3050038.
D. P. Fidler, “Cybersecurity in the Time of COVID-19,” Counc. Foreign Relations, no. 2020, pp. 7–9, 2020, [Online]. Available: https://www.cfr.org/blog/cybersecurity-time-covid-19.
D. Y. Perwej, S. Qamar Abbas, J. Pratap Dixit, D. N. Akhtar, and A. Kumar Jaiswal, “A Systematic Literature Review on the Cyber Security,” Int. J. Sci. Res. Manag., vol. 9, no. 12, pp. 669–710, 2021, doi: 10.18535/ijsrm/v9i12.ec04.
A. B. Ajmal, M. A. Shah, C. Maple, M. N. Asghar, and S. U. Islam, “Offensive Security: Towards Proactive Threat Hunting via Adversary Emulation,” IEEE Access, vol. 9, pp. 126023–126033, 2021, doi: 10.1109/ACCESS.2021.3104260.
A. O. David and A. E. Akinrayo, “Summary of Cyber Threat Intelligence,” no. February 2023, doi: 10.2015/IJIRMF/202203006.
H. Dandan, Z. Yajuan, L. Junfeng, L. Chen, X. Mo, and S. Zhihai, “Research on centralized data-sharing model based on master data management,” MATEC Web Conf., vol. 139, 2017, doi: 10.1051/matecconf/201713900195.
A. Mallik, A. Ahsan, M. M. Z. Shahadat, and J. C. Tsou, “Man-in-the-middle-attack: Understanding in simple words,” Int. J. Data Netw. Sci., vol. 3, no. 2, pp. 77–92, 2019, doi: 10.5267/j.ijdns.2019.1.001.
A. Manoj Athreya et al., “Peer-to-Peer Distributed Storage Using InterPlanetary File System,” Adv. Intell. Syst. Comput., vol. 1133, no. January, pp. 711–721, 2021, doi: 10.1007/978-981-15-3514-7_54.
H. Gao, Z. Ma, S. Luo, Y. Xu, and Z. Wu, “BSSPD: A Blockchain-Based Security Sharing Scheme for Personal Data with Fine-Grained Access Control,” Wirel. Commun. Mob. Comput., vol. 2021, 2021, doi: 10.1155/2021/6658920.
R. Zeng, J. You, Y. Li, and R. Han, “An ICN-Based IPFS High-Availability Architecture,” 2022.
F. A. Putra, K. Ramli, N. Hayati, and T. S. Gunawan, “Pura-scis protocol: A novel solution for cloud-based information sharing protection for sectoral organizations,” Symmetry (Basel)., vol. 13, no. 12, pp. 1–22, 2021, doi: 10.3390/sym13122347.
M. Changjun and L. Yi, “Government information sharing scheme for cross-departmental collaboration,” Proc. - 2020 Int. Signal Process. Commun. Eng. Manag. Conf. ISPCEM 2020, pp. 169–172, 2020, doi: 10.1109/ISPCEM52197.2020.00040.
Y. Zhang, S. Deng, Y. Zhang, and J. Kong, “Research on government information sharing model using blockchain technology,” Proc. - 10th Int. Conf. Inf. Technol. Med. Educ. ITME 2019, pp. 726–729, 2019, doi: 10.1109/ITME.2019.00166.
T. Takahashi, “TOWARD GLOBAL CYBERSECURITY COLLABORATION : CYBERSECURITY OPERATION ACTIVITY MODEL National Institute of Information and Communications Technology , Tokyo , Japan , takeshi takahashi@ieee.org Nara Institute of Science and Technology , Nara , Japan , youki,” Innov. Futur. Networks Serv., pp. 1–8, 2011.
D. J. Van Veen, R. S. Kudesia, and H. R. Heinimann, “An Agent-Based Model of Collective Decision-Making: How Information Sharing Strategies Scale with Information Overload,” IEEE Trans. Comput. Soc. Syst., vol. 7, no. 3, pp. 751–767, 2020, doi: 10.1109/TCSS.2020.2986161.
K. Lee, “Comments on ‘Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption,’” IEEE Trans. Cloud Comput., vol. 8, no. 4, pp. 1299–1300, 2020, doi: 10.1109/TCC.2020.2973623.
S. Ghernaouti, L. Cellier, and B. Wanner, “Information sharing in cybersecurity : Enhancing security, trust and privacy by capacity building,” 2019 3rd Cyber Secur. Netw. Conf. CSNet 2019, pp. 58–62, 2019, doi: 10.1109/CSNet47905.2019.9108944.
S. Pal, M. Hitchens, T. Rabehaja, and S. Mukhopadhyay, “Security requirements for the internet of things: A systematic approach,” Sensors (Switzerland), vol. 20, no. 20, pp. 1–34, 2020, doi: 10.3390/s20205897.
L. K. V. S. M. A. P. P. Rajalakshmi A, “A Blockchain and IPFS basedframework for secure Research record keeping,” Int. J. Pure Appl. Math., vol. 119, no. 15, pp. 1437–1442, 2018.
M. Patel and N. Patel, “Exploring Research Methodology,” Int. J. Res. Rev., vol. 6, no. 3, pp. 48–55, 2019.
DOI: https://doi.org/10.30591/jpit.v8i2.5141
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 4.0 International License.
JPIT INDEXED BY
![]() | ![]() | ![]() | ![]() |
![]() | ![]() | ![]() | |

This work is licensed under a Creative Commons Attribution 4.0 International License.








